Source |
Cyble |
Identifiant |
8648746 |
Date de publication |
2025-02-17 11:56:58 (vue: 2025-02-17 12:08:02) |
Titre |
IT Vulnerability Report: Ivanti, Apple Fixes Urged by Cyble |
Texte |
Overview
Cyble\'s vulnerability intelligence report to clients last week highlighted flaws in Ivanti, Apple, Fortinet, and SonicWall products.
The report from Cyble Research and Intelligence Labs (CRIL) examined 22 vulnerabilities and dark web exploits, including some with significant internet-facing exposures.
Microsoft had a relatively quiet Patch Tuesday, with the most noteworthy fixes being for two actively exploited zero-day vulnerabilities (CVE-2025-21391, a Windows Storage Elevation of Privilege Vulnerability, and CVE-2025-21418, a Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability), but other IT vendors also issued updates on the second Tuesday of the month. Both Microsoft vulnerabilities were added to CISA\'s Known Exploited Vulnerabilities catalog.
Cyble\'s vulnerability intelligence unit highlighted five new vulnerabilities as meriting high-priority attention by security teams, plus a month-old vulnerability at elevated risk of attack.
The Top IT Vulnerabilities
Three of the vulnerabilities highlighted by Cyble (CVE-2025-22467, CVE-2024-38657, and CVE-2024-10644) affect Ivanti Connect Secure (ICS), a secure |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
apple 10644 2024 2025 21391 21418 22467 24200 is 24472 300x150 38657 53704 is 55591 access actions actively activities added admin advisories affect affecting against aggregate alerts alignment all allow allowing also alternate analyze suspicious ancillary and cve an incident apple application appropriate arbitrary are areas assess assessment assets attack attacker attackers attempts attention audits authenticated authentication authoritative authorization automate aware backups based becoming been being below best blogs both buffer but bypass can caption= catalog certain certs channel cisa click here clients code com/wp complement compliance comprehensive conclusion conduct connect consider consistency content/uploads/2025/02/cyble control controls correlate could crafted create cril critical csf current customers cve cyble dark data day deployment detect detecting detection determining develop devices disable distinct divide driver effectiveness efficiency efforts elevated elevation enable ensure environment essential event events examined execute execution exercises exploit exploitation exploited exploits exposure exposures external extremely facing file file= firewall firewalls five fixes flaws following fortinet fortios fortiproxy from full function gain generations had hardware have high highlighted https://cyble ics identify image immediate impact implement implementing improper incidents includes including increases indicating indicators individuals information injection integrity intelligence internet inventory ipads iphones ips isolate issue issued its ivanti jpg known labs large last latest leaks less like limit logging logs low maintain maintaining making management may mechanism medium meriting microsoft mode monitor monitoring month most multiple nac name network networks new noted noteworthy nsv number official old organizations other outlines overflow overview patch patches patching path penetration perform periodic plan plus policies policy possible potential threats practices practices: prevent previously prioritize priority privilege privileges procedures process products protect protected protecting proxy public quickly quiet ransomware real recent recommendations recommends recovering reduce regular regularly relatively release remediate remote report report: reports requests research resistant respond responding response response plan restricted review risk second secure security segments sensitive sensitivity should siem significant significantly software solution solutions some sonicwall sophisticated sources specific sslvpn stack standards stated storage strategy strong subscribe such super surface exposed system systems take targeted teams test testing them these the attack those threat threats three through time title= top tuesday two unauthorized unit update updates upgraded urged usb use using vapt vendors verification vlans vulnerabilities vulnerability vulnerable web week when where who wider windows winsock writing your zero cyble |
Tags |
Vulnerability
Threat
Patching
Industrial
|
Stories |
|
Move |
|